Sensor wars: Detecting and defending against spam attacks in wireless sensor networks

被引:3
作者
Sancak, S [1 ]
Cayirci, E [1 ]
Coskun, V [1 ]
Levi, A [1 ]
机构
[1] Turkish Naval Acad, Naval Sci & Engn Inst, Istanbul, Turkey
来源
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7 | 2004年
关键词
wireless sensor networks; security; quarantine region; spam attacks;
D O I
10.1109/ICC.2004.1313227
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets that make the nodes relaying them deplete their energy. Especially the nodes closer to the sink fail sooner, because they convey more data packets. This causes the sink to be, disconnected from the sensor network. The counter-measures for this type of attacks, namely spam attacks, should consider that the sensor nodes have limited energy, computational power and memory. In this paper, we propose detect and defend against spams (DADS) scheme. In DADS the vicinity of the detected malicious node is notified about the quarantine region, and nodes do not relay unauthenticated messages coming from a node in the quarantine region. Our experiments show that our scheme fits the requirements of the sensor network.
引用
收藏
页码:3668 / 3672
页数:5
相关论文
共 50 条
[21]   Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes [J].
Bankovic, Zorana ;
Fraga, David ;
Moya, Jose M. ;
Carlos Vallejo, Juan .
SENSORS, 2012, 12 (08) :10834-10850
[22]   Security Attacks in Wireless Sensor Networks: A Survey [J].
Patel, Manish M. ;
Aggarwal, Akshai .
2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, :329-333
[23]   Attacks and Challenges in Wireless Sensor Networks [J].
Dinker, Aarti Gautam ;
Sharma, Vidushi .
PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, :3069-3074
[24]   DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS USING HOP COUNT ANALYSIS [J].
Yao, Lan ;
Zhao, Zhibin ;
Yu, Ge .
INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (01) :229-243
[25]   Mitigating DoS attacks against broadcast authentication in wireless sensor networks [J].
Ning, Peng ;
Liu, An ;
Du, Wenliang .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (01)
[26]   A defense against clock skew replication attacks in wireless sensor networks [J].
Huang, Ding-Jie ;
Teng, Wei-Chung .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 39 :26-37
[27]   Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks [J].
Siasi, Nazli ;
Aldalbahi, Adel ;
Jasim, Mohammed A. .
2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
[28]   Improving Resilience against Node Capture Attacks in Wireless Sensor Networks using ICmetrics [J].
Tahir, Ruhma ;
McDonald-Maier, Klaus .
2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2012, :127-130
[29]   Secure Decentralized Data Transfer against Node Capture Attacks for Wireless Sensor Networks [J].
Kohno, Eitaro ;
Ohta, Tomoyuki ;
Kakuda, Yoshiaki .
ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, :35-40
[30]   Distributed Detection of Wormhole Attacks in Wireless Sensor Networks [J].
de Graaf, Rennie ;
Hegazy, Islam ;
Horton, Jeffrey ;
Safavi-Naini, Reihaneh .
AD HOC NETWORKS, 2010, 28 :208-+